CATALANO, Dario
 Distribuzione geografica
Continente #
NA - Nord America 3.301
AS - Asia 1.279
EU - Europa 1.276
SA - Sud America 315
AF - Africa 112
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 3
Totale 6.297
Nazione #
US - Stati Uniti d'America 3.165
SG - Singapore 590
CN - Cina 486
IT - Italia 360
BR - Brasile 280
IE - Irlanda 269
UA - Ucraina 197
CA - Canada 115
RU - Federazione Russa 85
DE - Germania 82
SN - Senegal 65
FI - Finlandia 58
AT - Austria 46
GB - Regno Unito 44
KR - Corea 39
VN - Vietnam 38
FR - Francia 37
IN - India 33
SE - Svezia 24
AR - Argentina 19
CI - Costa d'Avorio 18
MX - Messico 14
BD - Bangladesh 13
NL - Olanda 12
CZ - Repubblica Ceca 11
UZ - Uzbekistan 11
ZA - Sudafrica 11
AU - Australia 10
ES - Italia 10
HK - Hong Kong 10
IQ - Iraq 9
JP - Giappone 9
PL - Polonia 9
TR - Turchia 9
MA - Marocco 6
CH - Svizzera 5
LT - Lituania 5
SA - Arabia Saudita 5
BJ - Benin 4
CO - Colombia 4
DK - Danimarca 4
PK - Pakistan 4
DZ - Algeria 3
EU - Europa 3
GR - Grecia 3
IR - Iran 3
LU - Lussemburgo 3
RO - Romania 3
TW - Taiwan 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
BG - Bulgaria 2
BY - Bielorussia 2
CL - Cile 2
DO - Repubblica Dominicana 2
EC - Ecuador 2
EG - Egitto 2
HN - Honduras 2
HU - Ungheria 2
ID - Indonesia 2
IL - Israele 2
JO - Giordania 2
LB - Libano 2
NG - Nigeria 2
NP - Nepal 2
PE - Perù 2
GD - Grenada 1
GY - Guiana 1
KH - Cambogia 1
LI - Liechtenstein 1
PA - Panama 1
PS - Palestinian Territory 1
PT - Portogallo 1
PW - Palau 1
PY - Paraguay 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
UY - Uruguay 1
Totale 6.297
Città #
Dallas 678
Santa Clara 618
Chandler 307
Singapore 288
Dublin 269
Jacksonville 199
Boardman 109
Catania 108
Ashburn 102
Beijing 92
Hefei 86
Toronto 77
Nanjing 76
Andover 75
Cambridge 72
Lawrence 69
Dakar 65
Nuremberg 52
Helsinki 48
Milan 43
Columbus 39
Seoul 39
Des Moines 37
Chicago 35
San Mateo 34
The Dalles 33
Los Angeles 32
Council Bluffs 31
Saint Petersburg 27
Wilmington 25
Rome 24
Hebei 22
São Paulo 22
Jiaxing 20
Nanchang 20
Ottawa 19
Abidjan 18
Brooklyn 18
New York 17
Houston 16
Shenyang 16
Vienna 14
Changsha 13
Ho Chi Minh City 13
San Francisco 13
Atlanta 12
Tianjin 12
Chennai 11
Buffalo 10
Manchester 10
Stockholm 10
Jinan 9
Reggio Calabria 9
Brno 8
Johannesburg 8
Kunming 8
London 8
Montreal 8
Palermo 8
Warsaw 8
Brasília 7
Guangzhou 7
Milazzo 7
Norwalk 7
Pune 7
Tokyo 7
Amsterdam 6
Civitanova Marche 6
Frankfurt am Main 6
Hanoi 6
Hong Kong 6
Mexico City 6
Moscow 6
Orem 6
Paris 6
Poplar 6
Seattle 6
Shanghai 6
Syracuse 6
Valverde 6
Washington 6
Zhengzhou 6
Belo Horizonte 5
Denver 5
Dhaka 5
Giardini-Naxos 5
Goiânia 5
Messina 5
Mumbai 5
Ningbo 5
Ravenna 5
Redondo Beach 5
Rio de Janeiro 5
Tashkent 5
Aachen 4
Aci Catena 4
Calgary 4
Campinas 4
Castiglione Olona 4
Cesa 4
Totale 4.391
Nome #
Multiparty Computation Method 167
Metodo di multiparty computation 158
Verifiable Pattern Matching on Outsourced Texts 128
Practical functional encryption for quadratic functions with applications to predicate encryption 124
Fully non-interactive onion routing with forward secrecy 120
Anamorphic Encryption: New Constructions and Homomorphic Realizations 118
Algebraic (trapdoor) one-way functions: Constructions and applications 115
A Color Opponency Watermarking Scheme for Digital Images 115
MonZa: Fast Maliciously Secure Two Party Computation on Z_(2^k) 114
A certificateless approach to onion routing 98
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions 97
Coercion-Resistant Electronic Elections 95
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications 93
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 92
Privacy-Preserving Fingercode Authentication 91
Zero-Knowledge Sets with Short Proofs 90
Practical homomorphic MACs for arithmetic circuits 90
On the security notions for homomorphic signatures 90
Algebraic (Trapdoor) One-Way Functions and Their Applications 89
A Fair Micro-Payment Scheme for Profit Sharing in a P2P Network 89
Coercion-Resistant Electronic Elections 86
Trapdoor Hard-To-Invert Group Isomorphisms and their Applications to Password-based Authentication 85
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 84
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings 82
Wildcarded Identity-Based Encryption 79
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results 78
Homomorphic Signatures with Efficient Verification for Polynomial Functions. 78
Fully Non-interactive Onion Routing with Forward-Secrecy 77
Labeled homomorphic encryption: Scalable and privacy-preserving processing of outsourced data 77
Hybrid Commitments and their Applications to Zero Knowledge Proof Systems 73
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations 73
Computing inverses over a shared secret modulus 72
Practical Homomorphic Message Authenticators for Arithmetic Circuits 72
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality 72
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security 71
Searchable Encryption Revisited: Consistency Conditions, Relation to Anonymous IBE, and Extensions 71
Paillier's Trapdoor Functions Hides up to O(N) bits 71
Adaptive Pseudofree Groups and Their Applications 71
Double-authentication-preventing signatures in the standard model 70
A P2P Market Place based on Aggregate Signatures 70
Constant Round Authenticated Group Key Agreement via Distributed Computation 70
Verifiable Pattern Matching on Outsourced Texts [2016] 70
Off-line/on-line signatures revisited: A general unifying paradigm, efficient threshold variants and experimental results 70
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. 69
Certificateless Onion Routing 69
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures 68
Efficient Distributed Computation Modulo a Shared Secret'' 68
Inner-Product Functional Encryption with Fine-Grained Access Control 68
Bandwidth-Efficient Threshold EC-DSA 68
Limits of Black-Box Anamorphic Encryption 67
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys 66
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions 66
Vector commitments and their applications 66
An Efficient Algorithm for the Approximate Median Selection Problem 66
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 65
Adaptively Secure Single Secret Leader Election from DDH 64
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework 64
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011 64
Verifiable Random Functions from Identity based Key Encapsulation 63
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data 63
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 63
IPAKE: Isomorphisms for Pasword-based Authenticated Key Exchange 63
New efficient and secure protocols for Verifiable Signature Sharing and other applications 63
Robust watermarking for Images Based on Colors Manipulation 62
Identity Based Encryption Gone Wild 61
Zero-Knowledge Sets with Short Proofs 60
Improved On-Line/Off-Line Threshold Signatures 60
New efficient and secure protocols for Verifiable Signature Sharing and other applications 60
Paillier's Cryptosystem Revisited 59
Learning SAT-k NF formulas from Membership queries 59
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness 59
Generalizing Homomorphic MACs for Arithmetic Circuits. 58
Hybrid Trapdoor Commitments and their Applications 58
Preface [Security and cryptography for networks] 58
Homomorphic Signatures and Message Authentication Codes. SCN 2014: 514-519 57
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions 57
Chainable Functional Commitments for Unbounded-Depth Circuits 57
The Bit Security of Paillier's Encryption Scheme and its Applications 54
The Hardness of Hensel Lifting: the Case of RSA and Discrete Logarithm 53
Double-authentication-preventing signatures in the standard model 53
Efficient Network Coding Signatures in the Standard Model 52
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups 51
Efficient and Universally Composable Single Secret Leader Election from Pairings 46
Robust watermarking for images based on color manipulation 43
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions 38
Totale 6.423
Categoria #
all - tutte 22.051
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 22.051


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021226 0 0 0 0 121 5 35 1 37 2 17 8
2021/2022544 61 74 0 5 76 0 77 21 43 1 15 171
2022/2023912 71 39 20 72 81 162 1 188 229 8 31 10
2023/2024453 36 42 19 33 16 27 2 21 2 108 61 86
2024/20252.035 17 149 131 62 446 298 89 217 132 157 136 201
2025/20261.620 251 137 703 229 300 0 0 0 0 0 0 0
Totale 6.423